Lab 3

docx

School

Victoria University *

*We aren’t endorsed by this school

Course

NIT2141

Subject

Information Systems

Date

Apr 3, 2024

Type

docx

Pages

3

Uploaded by shivnag

Report
Lab 3 Write a report by doing your own research to answer the following questions: 1- In a drug case, you suspect there has been communication between two suspected ringleaders, as both know about the delivery and pickup. The lawful interception has not seen any direct communication between these suspects: no SMS, calls, or direct data streams. You suspect they have used their smartphones to communicate. a) What do you think you can find on their phones? If there's suspicion of communication between two suspects in a drug case, despite the absence of direct communication via calls, SMS, or data streams intercepted through lawful means, there are still several avenues to explore on their smartphones: Messaging Apps Cloud Storage Location History Internet Browser History Photos and Videos Third Party Apps It's important to note that accessing this information may require appropriate legal authorization, such as a warrant, and should be conducted in agreement with applicable laws and regulations. b) How would you start looking for their communication? When facing with the challenge of investigating suspected communication between two individuals in a drug case, despite the lack of direct evidence from lawful interception, there are several steps to start looking for their communication on their smartphones: Digital Forensic Analysis Network Analysis Application Analysis Deleted Data Recovery Collaboration with Tech Experts Interviews Surveillance and Monitoring By analytically exploring these paths and employing a combination of technical analysis, forensic techniques, and investigative strategies, law enforcement agencies can effectively uncover evidence of communication between suspected ringleaders in a drug case. c) Anything you can do before the suspects are brought in? Before bringing the suspects in for questioning or further investigation, there are several steps you can take to gather preliminary evidence and build a case: Surveillance Data Analysis Witness Interviews Search Warrants Informant Cooperation By taking these proactive steps before bringing the suspects in, law enforcement agencies can gather additional evidence, identify potential communication methods, and strengthen the case against the suspected ringleaders in the drug operation.
d) How would you acquire the data from the phones? Acquiring data from the smartphones of suspected ringleaders in a drug case can be a complicated process, requiring law and guidelines. Here's how you might proceed to gain access to the data: Obtain Legal Authorization Secure the Devices Use Forensic Tools Cloud Data Extraction Backup Extraction Analyze the Data By following these steps and following law and guidelines, law enforcement agencies can gain access to the data from the smartphones of suspected ringleaders in a drug case to gather evidence and build a stronger case. e) And how would you search for traces? If there is direct communication between the suspected ringleaders in a drug case hasn't been detected through lawful capture methods such as SMS, calls, or direct data streams, but there is a suspicion that they've used their smartphones to communicate, there are several methods to search for traces of communication: App Usage Analysis Deleted Data Recovery Network Traffic Analysis Digital Footprint Analysis Location Tracking Content Hiding Techniques Informant Help By analytically exploring these paths and employing a combination of technical analysis, forensic techniques, and investigative strategies, law enforcement agencies can search for traces of communication between suspected ringleaders in a drug case. 2- The handling of evidence is an important consideration. The crime scene investigator has found a phone on the scene of crime, and suspects that there is crucial evidence in the phone. The phone seems to have some droplets inside the cracked screen. He hands you the phone and says that due to the importance of the digital evidence, you should acquire the data first, and then the other forensic experts will look for fingerprints and biological traces after you are finished. A) How should you handle the device? Handling the device properly is crucial to maintain the integrity of the digital evidence. Here's how I would handle the device in this scenario: Secure the Device Secure Storage Prevent Further Damage Acquire Data First Use Forensic Tools Coordinate with Other Experts
By following these steps and handling the device with care, you can acquire the digital evidence from the phone while maintaining its integrity for following forensic analysis by other experts. B) What should you do to minimize the health hazards? To minimize health hazards associated with handling the phone with drop inside the cracked screen, follow these precautions: Personal Protective Equipment (PPE) Isolation Hand Hygiene Proper Disposal Communication By following these precautions, you can minimize health hazards while acquiring digital evidence from the phone with droplets inside the cracked screen, ensuring the safety of both yourself and others involved in the investigation. C) And how to minimize the impact you leave on the other traces? To minimize the impact on other traces, such as fingerprints and biological material, while gaining digital evidence from the phone, follow these precautions: Minimize Handling Use Clean Tools Document Before and After Handle with Care Isolate the Device Organize with Other Experts Clean Workspace By following these precautions, you can minimize the impact on other traces while gaining digital evidence from the phone, ensuring the integrity of all evidence collected during the investigation. 3- What should we consider before picking up an electronic device at the scene of crime? Before picking up an electronic device at the scene of a crime, several factors should be considered to ensure the integrity of the evidence and the safety of investigators: Safety Precautions Power Status Securing the Device Potential Data Encryption External Storage Media Talk with Experts By considering these factors before picking up an electronic device at the scene of a crime, investigators can ensure the integrity of the evidence and maximize the potential for obtaining valuable information for the investigation.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help